welcome to Cross-Tech Ltd
Welcome to our web site

Computer Repairs

The computer has become so entrenched into our modern society that it is used on a daily basis as a workstation, information and entertainment system without too much thought given to how it actually does it's magic.
However a computer can be thought of as a box of silicon micro chips powered by electricity, and can be susceptible to all kinds of weird behaviour.
The computer is a great tool when it is working the way it should however when that expensive box of silicon chips begins to exhibit strange behaviour or even worse fails to even power on, can be the source of very very much frustration.

Computer Networking

There are two types of computer networking technologies in popular use today, wired and wireless. In a wired network data travels through a wire cable which is connected at one end to a computer on the network, to the other end of the cable which is connected to a central network hub/switch, the data then travels through the central hub and along other connected wire cables to the final destination networked computer.

Where as in a wireless network data passes through the air as radio waves. Each computer in a wireless network is fitted with a wireless network adaptor, which moves data to and from a central access point which in turn passes the data through the air between other wireless network devices including computers laptops and printers.

Computer Virus

The Morris worm or Internet worm was one of the first computer worms distributed via the Internet; it is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the USA under the 1986 Computer fraud and Abuse Act. It was written by a student at Cornell University, Robert Tappan Morris, and launched on November 2 1988 from MIT.

Today malicious software is a very sophisticated beast; with some viruses and other unwanted software (including spyware) designed to reinstall themselves after they have been detected and removed.

Data Recovery

Data recovery is the process of salvaging data from damaged, failed, corrupted or inaccessible secondary storage media when it canot be accessed normally. Often the data is salvaged from storage media formats such as hard disk drives, storage tapes, CDs, DVDs, camera memory cards and other electronic devices.
Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system.

Data cleansing; if you've decided to donate your old computer to a charity, a local group or school, it's important to make sure that the computers hard disk drive is completely free of any personal and sensitive data which could potentially be used to steal your identity amongst other things.

Custom Built Computers

Although the computer systems which can be purchased from the major computer dealers PC World or Dell for example are very capable, up to date and value for money, these computer systems are mass produced and lack any individuality.

Build-to-order Computers, or Custom PC's are systems that are designed and built specifically to suit your needs and wants. As such, every system is unique to the person who orders it. From powerful desktop systems, high-end gaming or video editing systems to reliable network server systems.

Computer Security

Your computer system is a popular target for intruders. Why? Because intruders want what you've stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy themselves goods and services or they may sell your information on to third-party criminals.

But it's not just money-related information they're after. Intruders also want your computer's resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to figure out where the attack is really coming from. If intruders can't be found, they can't be stopped, and they can't be prosecuted.